CyberLink Will Showcase the Latest Applications of its FaceMe® AI Facial Recognition Solution at CES 2020

Taipei, Taiwan — December 20, 2019CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, will showcase FaceMe® with several innovative applications of its cutting-edge AIoT technologies for use cases covering authentication, access control, safety, security, visitor analytics and more at CES 2020, booth #25555, Hall South 2, in the Las Vegas Convention Center, January 7-10, 2020.

FaceMe® is an AI facial recognition engine at the forefront of biometric solutions with innovation that keeps pushing standards for accuracy, performance, security and flexibility, across a wide range of industries. Since the launch of FaceMe® in late 2018, CyberLink has collaborated with over a hundred global partners, including hardware makers, solution providers and system integrators, deploying the technology across multiple IoT/AIoT scenarios. CES visitors will be able to experience firsthand a number of these new applications

 

FaceMe® is one of the world’s top facial recognition engines. Its edge-based architecture delivers very precise biometric data in a few milliseconds, runs cross-platform, and supports a variety of hardware configurations.  Powered by deep learning and neural network algorithms FaceMe® detects faces on live feeds or recorded videos to identify people and measure a number of attributes such as age, gender, mood and face orientation. It yields up to a 99.82% accuracy rate over Labeled Faces in the Wild (LFW) database, and is ranked 12th among all participants in FRVT 1:1 (WILD 1E-4) in the Face Recognition Vendor Test (FRVT) conducted by the U.S. National Institute of Standards and Technology (NIST). FaceMe® offers cross-platform capabilities on Windows, Linux, Android and iOS, for a variety of edge devices and different hardware configurations, such as security systems, retail store cameras, smart door bells, body cameras and service robots. 

“Facial recognition and edge-based AI are quickly becoming some of the market’s hottest technologies and with FaceMe®, we are committed to providing our fast-growing customer base around the world with the most flexible, precise biometric solutions,” said Dr. Jau Huang, CyberLink’s founder and CEO. “Visitors to our CES booth will be able to learn about FaceMe® and experience some of the most recent and exciting applications of our cutting-edge technology.”

Richard Carriere, Senior Vice President and General Manager at CyberLink, has been invited by the Taiwan External Trade Development Council (TAITRA) to speak about current trends in AI technology and the latest innovations to the FaceMe® AI recognition engine in a Press Conference at CES 2020, held on January 6, 2020 at 3 p.m. in the Oceanside Ballroom F, at the Mandalay Bay Convention Center. Come meet the FaceMe® team and take a look at our latest developments in AI and facial recognition. Experience our technology through several demos and use cases at booth #25555, Hall South 2, in the Las Vegas Convention Center.

To schedule a meeting, please contact us

Press Meeting: Click here to make an appointment
Sales Meeting: Click here to make an appointment

For more information about FaceMe®, please visit the official website at www.cyberlink.com/FaceMe

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

CyberLink CEO Dr. Jau Huang Shares Insights on Edge Computing and Showcases FaceMe® AI-based Facial Recognition Engine at Intel Edge Computing Solution Summit

Taipei, Taiwan — December 19, 2019—CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, participated in the Intel Edge Computing Solution Summit. The summit brought together leaders from the IoT industry who shared insights on AI edge computing’s latest breakthroughs and the opportunities that this technology will bring in the future. Dr. Jau Huang, CyberLink’s founder and CEO, was invited to speak about the benefits of edge computing and how it enables precise, fast, affordable and secure AIoT use cases including facial recognition, such as the company’s FaceMe® AI-based engine.

 

With FaceMe®, CyberLink has leveraged edge-based technology and AI to deliver one of the world’s most precise, flexible and best performing facial recognition engines. Compared with cloud-based solutions, edge computing is much cheaper, greatly enhances flexibility and provides real-time response, helping system integrators quickly develop and add new functionalities into existing systems and new AIoT products. FaceMe® AI facial recognition has been integrated into solutions such as identity verification, access control, statistics and customer service, across a number of industries including retail, banking, healthcare, manufacturing, security, and public safety. At the summit, Dr. Huang shared insights on edge computing current trends, opportunities and challenges, illustrated by several customer success stories.

“AI-based facial recognition is one of the key AIoT enablers and is on its way to become ubiquitous, with the proliferation of edge solutions embedded into any devices equipped with cameras,” said Dr. Jau Huang, founder and CEO of CyberLink. “FaceMe® is very well positioned to become the engine of choice across industries.”

Edge computing is one of the fastest developing and widely-applied IoT technologies. At the summit, CyberLink showcased its FaceMe® facial recognition engine powered by Intel Movidius and optimized by OpenVINO, drawing attention from hundreds of attendees. Using OpenVINO, FaceMe®’s algorithm can achieve a 7x performance boost making FaceMe® the best option on the Intel platform.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

ESET identifies Latin American banking trojan, Mispadu, targeting victims with malicious Facebook ads

BRATISLAVA – ESET, a global leader in cybersecurity, continues its research into Latin American banking trojans with the identification of another previously unknown malware family, Mispadu.

Similar to the Amavaldo and Casbaneiro malware families recently described by ESET, Mispadu is written in Delphi and targets victims through the use of fake pop-up windows trying to persuade potential victims to share their personal details and credentials. The Mispadu banking trojan, which primarily targets Brazil and Mexico, contains backdoor functionality, can take screenshots, simulates mouse and keyboard actions, and captures keystrokes.

The ESET research team has seen the Mispadu family using two different distribution methods – spam and malvertising. While the former is common among Latin American banking trojans, the latter is quite rare. The threat actor behind Mispadu places sponsored advertisements on Facebook that offer fake discount coupons for McDonald’s. Clicking on the advertisement leads the potential victim to a malicious webpage where a ZIP file containing an MSI installer, masquerading as a discount coupon, can be downloaded. If downloaded and executed, a chain of three scripts follows, resulting in the download and execution of the Mispadu banking trojan. The trojan uses four potentially unwanted applications, all modified copies of legitimate software, to extract the victim’s stored credentials from web browsers and email clients.

In Brazil, Mispadu has been seen also distributing an interesting, malicious Google Chrome extension. The extension claims to “Protect your Chrome,” but instead it attempts to steal credit card and online banking data, and can even compromise Boleto, a popular payment system in Brazil that uses a barcode-based ticketing system to transfer payments. The Boleto component of the Mispadu malware attack is its most advanced feature, as it replaces the legitimate barcode on a Boleto ticket with one connected to the attacker’s bank account, generated via the abuse of a legitimate website.

For more details, read the blog post, Mispadu: advertisement for a discounted Unhappy Meal, on WeLiveSecurity.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

CyberLink’s FaceMe® Cooperates with Advantech on AIoT Breakthrough, Showcasing New and Unmatched Level of Performance for its AI-based Facial Recognition Engine

Taipei, Taiwan — December 12, 2019CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, participated in 2020 Advantech Embedded-IoT World Partner Conference at Advantech’s Linkou Smart Campus. Dr. Jau Huang, CyberLink’s founder and CEO was invited to speak about the results of its successful and strategic partnership with Advantech in the conference’s segment entitled: “TechTalks: The Evolution of Edge Computing and AI.” The partnership is enabling considerable enhancements to FaceMe®’s performance when running on Advantech’s AIR Inference System combined with Intel Movidius VPU. It provides a significant proof point on both companies’ leadership in the global AIoT industry.

 

Powered by deep learning algorithms, FaceMe® delivers reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, security, public safety, banking and smart home. Based on machine learning and deep neural network, FaceMe® has an accuracy rate (TAR, True Acceptance Rate) of 99.5% at 10-4 FAR. It ranks amongst the most precise and fastest facial recognition engines in the NIST’s Face Recognition Vendor Test (FRVT). Built for Windows, Linux, Android, and iOS, FaceMe® is one of the most flexible and comprehensive cross-platform development solutions.

At the conference, Advantech demonstrated its AIR Inference System powered by Intel Movidius VPU, showcasing a 20X improvement in FaceMe®’s performance compared to a similar system equipped with a conventional CPU – all while maintaining the engine’s outstanding facial recognition precision. In addition to driving down the costs of bandwidth and computation over AI solutions running on the cloud, Edge-based FaceMe® furthers its already considerable performance advantage when using this new Advantech system.

“Leading hardware developers and system integrators around the world strive to innovate and develop new AI solutions. We welcome collaboration initiatives that integrate FaceMe®’s AI facial recognition engine and bring reliable, secure and highly performing offerings to the market,” said Dr. Jau Huang, CyberLink’s founder and CEO. “CyberLink and Advantech’s partnership is strengthening both companies’ global AIoT leadership.”

Advantech is a global leader in the fields of IoT intelligent systems and embedded platforms. With FaceMe®, CyberLink is providing hardware developers and system integrators one of the world’s most precise, fastest and most flexible AI facial recognition engines, driving a wide and rapidly growing range of AIoT applications and scenarios.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

NetJapan Releases ActiveImage Protector™ 2018 Update 4 Now with Replication

Download PDF

Tokyo – NetJapan, Inc., publisher of disk imaging backup, disaster recovery, and virtualization software, announces the release of ActiveImage Protector™ 2018 Update 4, a backup and disaster recovery solution now with offsite replication features.

This update includes post-backup replication. Replicate completed backup image files to major cloud storage providers including Amazon S3, Google Drive, and Dropbox.

The newly enhanced BootCheck confirms that backup images are bootable and can be manually configured to run at a specified time.

New Features:

  • Backup Replication
    ActiveImage Protector includes offsite replication of backup image files. Replication can be configured to run as a post-backup process. Until now, replication was a feature limited to ImageCenter LE. Supported replication targets includes local storage, network storage, FTP, FTPS, SFTP, WebDAV, and major storage providers Amazon S3, Azure, One Drive, Google Drive, and Dropbox.
  • Manual BootCheck
    By adding manual BootCheck™ to Image Manager, checking bootability of backup image files is simplified. BootCheck™ confirms that your backup images are bootable. Check bootability locally or on a remote Hyper-V or ESXi host.
  • Extended HyperStandby Support for LVM Disks
    Create Standby Virtual Machines from Linux Logical Volume Manager backups directly into hypervisors to bring online for immediate switch-over.

Additional Features:

  • Fast online backup of a hard disk entirely including OS, applications, files, and configured settings.
  • Agent-based and agentless backup options.
  • Fastest full and incremental backup in the market.
  • HyperStandby™ uses NetJapan’s vStandby™ technology to create and maintain standby virtual machines from backup images for instant switch-over.
  • Inline Data Deduplication Compression™ (IDDC) drastically reduces storage requirements for backup images by eliminating duplicate data before compressing.
  • Strong encryption of backup images.
  • Online backup of SQL Server and Oracle databases.
  • Flexible backup schedule and image file generation management.
  • Image based backup for fast and secure recovery.
  • Individual file and folder recovery.

For further product information and system requirements, please visit: https://www.netjapan.com/en-us/backup-dr-solutions/backup-and-recovery-for-windows/

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

Winnti Group’s skip‑2.0: A Microsoft SQL Server backdoor

Notorious cyberespionage group debases MSSQL
For a while, ESET researchers have been tracking the activities of the Winnti Group, active since at least 2012 and responsible for high-profile supply-chain attacks against the video game and software industry. Recently, we discovered a previously undocumented backdoor targeting Microsoft SQL (MSSQL) that allows attackers to maintain a very discreet foothold inside compromised organizations. This backdoor bears multiple similarities to the PortReuse backdoor, another tool used by the Winnti Group that was first documented by ESET in October 2019, such as the use of the same custom packer and VMProtected launcher, which is why we attribute this backdoor to the Winnti Group.
Earlier this year, we received a sample of this new backdoor called skip-2.0 by its authors and part of the Winnti Group’s arsenal. This backdoor targets MSSQL Server 11 and 12, allowing the attacker to connect stealthily to any MSSQL account by using a magic password – while automatically hiding these connections from the logs. Such a backdoor could allow an attacker to stealthily copy, modify or delete database content. This could be used, for example, to manipulate in-game currencies for financial gain. In-game currency database manipulations by Winnti operators have already been reported. To the best of our knowledge, skip-2.0 is the first MSSQL Server backdoor to be documented publicly. Note that even though MSSQL Server 11 and 12 are not the most recent versions (released in 2012 and 2014, respectively), they are the most commonly used ones according to Censys’s data.
We recently published a white paper updating our understanding of the arsenal of the Winnti Group, and that exposed a previously undocumented backdoor of theirs called PortReuse. It uses an identical packer to that used with the payload embedded in compromised video games uncovered by ESET in March 2019. The VMProtected launcher that drops the PortReuse backdoor was also found being used to launch recent ShadowPad versions. In that context, we were able to find a new tool called skip.2-0 by its developer. It uses the same VMProtected launcher as well as Winnti Group’s custom packer and exhibits multiple similarities with other samples from the Winnti Group’s toolset. This leads us to ascribe skip-2.0 to that toolset also.
This article will focus on the technical details and functionality of this MSSQL Server backdoor, as well as on exposing the technical similarities of skip.2-0 with the Winnti Group’s known arsenal – in particular, with the PortReuse backdoor and ShadowPad. A note on the reasons why we chose the “Winnti Group” naming can be found on our white paper.

VMProtected launcher

We found skip-2.0 while looking for VMProtected launchers, for which the payload is usually either PortReuse or ShadowPad.

Embedded payload

As with the encrypted PortReuse and ShadowPad payloads, skip-2.0 is embedded in the VMProtected launcher’s overlay, as shown in Figure 1:


Figure 1. VMProtected launcher’s headers. The payload is embedded in the PE overlay.

Encryption

The payload encryption is identical to that used in the other VMProtected launchers. It is RC5-encrypted with a key derived from the VolumeID and the string f@Ukd!rCto R$. – as described in our previous white paper on the Winnti Group arsenal.

Persistence

As in the case of PortReuse and ShadowPad, the launcher probably persists by exploiting a DLL hijacking vulnerability by being installed at C:WindowsSystem32TSVIPSrv.DLL. This results in the DLL being loaded by the standard Windows SessionEnv service at system startup.

 

Winnti Group’s custom packer

Once decrypted the embedded payload is actually Winnti Group’s custom packer. This packer is the same shellcode that was documented in our previous article and white paper. It is used to pack the PortReuse backdoor as well as the payload embedded in the compromised video games.

Packer configuration

As described in our previous article, the packer configuration contains the decryption key of the packed binary as well as its original filename, its size and the execution type (EXE or DLL). The payload’s packer configuration is shown in Table 1.

Parent SHA-1Payload SHA-1RC4 keyFilenameLaunch type
9aafe81d07b3e5bb282608f0a2a4656eb485b7c9a2571946ab181657eb825cde07188e8bcd689575163716559Inner-Loader.dll2

Table 1. Payload’s packer configuration
One can see from the packer configuration that the payload is called Inner-LoaderInner-Loader is the name of an injector that is the part of the Winnti Group’s arsenal used to inject the PortReuse backdoor into processes listening on a particular port, as described in our previous publication. Beyond that identical name, by analyzing this payload it appears that it is another variant of the Inner-Loader injector.

Inner-Loader injector

This variant of Inner-Loader, instead of looking for a process listening on a particular port, as in the case when injecting the PortReuse backdoor, looks for a process called sqlserv.exe, which is the conventional process name of MSSQL Server. If found, Inner-Loader then injects a payload into this process. This payload is also packed with the custom packer – the packer configuration of that payload is shown in Table 2.

Parent SHA-1Payload SHA-1RC4 keyFilenameLaunch type
a2571946ab181657eb825cde07188e8bcd68957560b9428d00be5ce562ff3d888441220290a6dac7923567961skip-2.0.dll2

Table 2. Packer configuration of the payload embedded in Inner-Loader
The original filename of this injected payload is skip-2.0.dll

skip-2.0

After having been injected and launched by Inner-Loaderskip-2.0 first checks whether it is executing within an sqlserv.exe process and if so, retrieves a handle to sqllang.dll, which is loaded by sqlserv.exe. It then proceeds to find and hook multiple functions from that DLL. Figure 2 depicts the skip-2.0 chain of compromise.

Figure 2. skip-2.0 unpacking and injection

Hooking sqllang.dll

The hooking procedure used by skip-2.0 is very similar to the one used by NetAgent, the PortReuse module responsible for installing the networking hook. This hooking library is based on the distorm open source disassembler that is used by multiple open source hooking frameworks. In particular, a disassembling library is needed to correctly compute the size of the instructions to be hooked. One can see in Figure 3 that the hooking procedure used by NetAgent and skip-2.0 are almost identical.

Figure 3. Hex-Rays output comparison between the NetAgent (left) and skip-2.0 (right) hooking procedures
There is one notable difference, which is the fact that the hooking function from skip-2.0 takes the address of the hook to be installed as an argument, while for NetAgent, the address of the hook to install is hardcoded. This is due to the fact that skip-2.0 has to hook multiple functions in sqllang.dll to operate properly, while NetAgent targets only a single function.
To locate each sqllang.dll function to be hooked, skip-2.0 first retrieves the size of the DLL once loaded in memory (i.e. its virtual size) by parsing its PE headers. Then an array of bytes to be matched within sqllang.dll is initialized as shown in Figure 4. Once the address of the first occurrence matching the byte array is found, the hook is installed using the procedure shown in Figure 3.

Figure 4. Hex-Rays output of the procedure initializing the byte array to match in sqllang.dll
The success of the hook installation is then logged in cleartext in a log file located at the hardcoded path C:WindowsTempTS_2CE1.tmp and shown in Figure 5.

Figure 5. Log generated during hooks installation
Should the targeted function not be found, the hook installer searches for a fallback function, with a different set of byte patterns.
Matching a sequence of bytes to locate the address of the targeted function instead of using a static offset, plus using a fallback sequence of bytes, allows skip-2.0 to be more resilient to MSSQL updates and to potentially target multiple sqllang.dll updates.

One password to rule them all

The functions targeted by skip-2.0 are related to authentication and event logging. The targeted functions include:

  • CPwdPolicyManager::ValidatePwdForLogin
  • CSECAuthenticate::AuthenticateLoginIdentity
  • ReportLoginSuccess
  • IssueLoginSuccessReport
  • FExecuteLogonTriggers
  • XeSqlPkg::sql_statement_completed::Publish
  • XeSqlPkg::sql_batch_completed::Publish
  • SecAuditPkg::audit_event::Publish
  • XeSqlPkg::login::Publish
  • XeSqlPkg::ual_instrument_called::Publish

The most interesting function is the first one (CPwdPolicyManager::ValidatePwdForLogin), which is responsible for validating the password provided for a given user. This function’s hook checks whether the password provided by the user matches the magic password; if that is the case, the original function will not be called and the hook will return 0, allowing the connection even though the correct password was not provided. A global flag is then set that will be checked by the other hooked functions responsible for event logging. The corresponding decompiled procedure is shown in Figure 6. In the case where this global flag is set, the hooked logging functions will silently return without calling their corresponding, original functions, so the action will not be logged. In the case where a different password is provided, the original function is called.

Figure 6. Hex-Rays output of the procedure responsible for matching the password provided at login with the hardcoded string
A similar backdooring technique, based on hardcoded passwords, was used with SSH backdoors previously discovered by ESET. The difference here is that skip-2.0 is installed in-memory, while in the case of the SSH backdoors the sshd executable was modified prior to execution.
Additionally, CSECAuthenticate::AuthenticateLoginIdentity will be called from within its hook code but the hook will always return 0. The ReportLoginSucess and IssueLoginSuccessReport hooks will not call the original functions if the magic password was used to log in. The same behavior is applied to FEExecuteLogonTriggers. Other logging functions such as XeSqlPkg::sql_statement_completed::Publish or XeSqlPkg::sql_batch_completed::Publish will also be disabled in the case where the user logged in with the magic password. Multiple audit events are disabled as well, including SecAuditPkg::audit_event::Publish, XeSqlPkg::login::Publish and XeSqlPkg::ual_instrument_called::Publish.
This series of hooks allows the attacker not only to gain persistence in the victim’s MSSQL Server through the use of a special password, but also to remain undetected thanks to the multiple log and event publishing mechanisms that are disabled when that password is used.
We tested skip-2.0 against multiple MSSQL Server versions and found that we were able to login successfully using the special password with MSSQL Server 11 and 12. To check whether a particular sqllang.dll version is targeted by skip-2.0 (i.e., that matches the byte patterns), we created a YARA rule, which can be found in our GitHub repository.

Connection with the Winnti Group

We observed multiple similarities between skip-2.0 and other tools from the Winnti Group’s arsenal. Its VMProtected launcher, custom packer, Inner-Loader injector and hooking framework are part of the already known toolset of the Winnti Group. This leads us to think that skip-2.0 is also part of that toolset.

Conclusion

The skip-2.0 backdoor is an interesting addition to the Winnti Group’s arsenal, sharing a great deal of similarities with the group’s already known toolset, and allowing the attacker to achieve persistence on an MSSQL Server. Considering that administrative privileges are required for installing the hooks, skip-2.0 must be used on already compromised MSSQL Servers to achieve persistence and stealthiness.
We will continue to monitor new activities of the Winnti Group and will publish relevant information on our blog. For any inquiries, contact us at threatintel@eset.com.

Indicators of Compromise (IoCs)

ComponentSHA-1ESET detection name
VMP Loader18E4FEB988CB95D71D81E1964AA6280E22361B9F
4AF89296A15C1EA9068A279E05CC4A41B967C956
Win64/Packed.VMProtect.HX
Inner-Loader injectorA2571946AB181657EB825CDE07188E8BCD689575Win64/Injector.BS
skip-2.060B9428D00BE5CE562FF3D888441220290A6DAC7Win32/Agent.SOK
Known targeted sqllang.dll files (non-exhaustive list)4396D3C904CD340984D474065959E8DD11915444
BE352631E6A6A9D0B7BBA9B82D910FA5AB40C64E
D4ADBC3F77ADE63B836FC4D9E5915A3479F09BD4
0BBD3321F93F3DCDD2A332D1F0326142B3F4961A
FAE6B48F1D6EDDEC79E62844C444FE3955411EE3
A25B25FFA17E63C6884E28E96B487F58DF4502E7
DE76419331381C390A758E634BF2E165A42D4807
ED08E9B4BA6C4B5A1F26D671AD212AA2FB0874A2
1E1B0D91B37BAEBF77F85D1B7C640B8CC02FE11A
59FB000D36612950FEBC36004F1317F7D000AA0B
661DA36BDD115A1E649F3AAE11AD6F7D6FF2DB63
N/A

 

MITRE ATT&CK techniques

TacticIDNameDescription
ExecutionT1035Service Executionskip-2.0 is started with the SessionEnv service
PersistenceT1038DLL Search Order Hijackingskip-2.0 probably uses a DLL hijacking technique against the SessionEnv service
T1179Hookingskip-2.0 hooks multiple functions in sqllang.dll service to bypass authentication and maintain stealth
Defense EvasionT1054Indicator Blockingskip-2.0 blocks event logging
T1045Software Packingskip.2-0 and Inner-Loader are packed using Winnti’s custom packer. Further, the launcher is VMProtected.
DiscoveryT1057Process DiscoveryInner-Loader lists running processes in order to find the process running MSSQL Server
ImpactT1485Data Destructionskip-2.0 allows unauthorized access to MSSQL databases, allowing data destruction or tampering
T1494Runtime Data Manipulationskip-2.0 manipulates event logging at runtime
T1492Stored Data Manipulationskip-2.0 allows unauthorized access to MSSQL databases, allowing manipulation of stored data

 

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

CyberLink Introduce YouCam 9, Redefining the Best Webcam , Software for Windows

YouCam 9 provides new features for streamers, business users, and consumers,
delivering the most extensive webcam experience yet

Taipei, Taiwan —November 13, 2019— CyberLink Corp. (5203.TW), the world’s leading consumer multimedia software company, has announced the launch of YouCam 9 webcam software. YouCam 9 redefines webcam software by adding exclusive features designed for streamers, such as the ability to use customized branding overlays and insert ads during live-casting events. YouCam 9 further adds touch-up features such as live makeup and skin smoothing, ensuring streamers and business users look their best during live events and video conferences.

 

YouCam is widely ranked by users and media as the best webcam software for Windows. It is the essential companion to video conferences, live streaming events, business presentations, and informal video chats.

YouCam 9 integrates seamlessly with popular video conferencing apps, including CyberLink U Meeting, Skype, and Google Hangouts. Furthermore, YouCam 9 supports broadcasting services and software such as Twitch, Facebook Live, YouTube Live, OBS Studio, XSplit, and Wirecast. As soon as they set YouCam as their default camera, users can instantly enrich video calls and live events with more than 200 webcam effects, such as animojis, gadgets, and animated stickers, and access a wide range real-time makeup options.

“Webcams are a must-have accessory for desktop and notebook PCs, and CyberLink’s YouCam is widely recognized as the number one choice to make video conferencing more engaging and entertaining,” said Dr. Jau Huang, CEO of CyberLink Corp. “With YouCam 9, we are introducing exclusive features designed for streamers and business users, further expanding the most comprehensive webcam experience and redefining webcam software’s capabilities.”

YouCam 9 Features
– Customizable Overlay with Titles and Images for Live Streaming

– Live Makeup
– Face Beautification Tools
– Live Skin Smoothing

– Lighting, Sharpness & Denoise Adjustments

– Face Login and Face-out
– Over 200 Real-time Video Effects: Animojis Gadgets, Particles, Filters, and Distortions

Availability

YouCam 9 is available today from the CyberLink Online Store . Free Essential version is available to download from CyberLink Website .

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

GREYCORTEX WINS EY CYBERSECURITY SPACE INNOVATION TROPHY

Brno, Czech Republic

GREYCORTEX is happy to announce that we have won the 2019 EY Cybersecurity Trophy (EY ESO) in the Cybersecurity Space Innovation category. The winners were announced at an awards ceremony in Bratislava, Slovakia on December 10, 2019.
EY, whose motto is “Building a better working world,” has identified the need for greater focus on cybersecurity. Based on many years with the world’s leading consulting firms, competition founder Peter Borák, has good reason to emphasize cybersecurity. Due to the increasing frequency of cyber-attacks, extremely sensitive data is leaked, and risks increase every year. “Our primary concern is to help organizations make better decisions on very complex cybersecurity issues. With faster digitization, the risk is accelerating. All organizations should take care about their data protection,” said Borák.

In its Global Information Security Survey, EY recommends that cyber security and surveillance be included in the structure of every organization. EY’s main goal is not only to draw attention to the problem and to inform the professional and general public about the cyber security issues, but also to offer solutions and a wider understanding of the context of the problem. This is why EY recognizes innovative cybersecurity companies and ethical hackers with these awards.
Petr Chaloupka, CEO of GREYCORTEX, noted after receiving the award: “Cybercriminals now run on huge budgets and are constantly improving their procedures. This is the reason why cybersecurity analysts also need to have state-of-the-art technology to defend themselves effectively. Today, it is no longer possible to manually analyze all traffic in each individual private or state organization, to monitor all possible attack vectors, or eliminate all human failures. That’s why advanced technologies, machine learning, and artificial intelligence are on the scene to help with this defense.” Thanks to the integration of these principles into our MENDEL product, GREYCORTEX was included in Gartner’s 2019 Market Guide for Network Traffic Analysis.

This year, the EY ESO winners are Rastislav Klč in the EY ESO Chief Information Security Officer category, Tomáš Ležovič as EY ESO DNA Born Ethical Hacker, GREYCORTEX s.r.o. as the EY ESO Cyber Security Space Innovation, and Milan Kyselica as the winner of the EY ESO Security Future Promise, as well as overall winner.

EY ESO photo

CyberLink Corp. Co-Hosts “AI Meets Beauty Challenge” with Perfect Corp. to Develop AI Subject Identification Technology for Smart Retail

San Jose, California—November 5, 2019- CyberLink (5203.TW), a pioneer of AI, facial recognition, and multimedia software, co-hosted the second global competition “AI Meets Beauty Challenge” with Perfect Corp. and National Chiao Tung University (Taiwan). The winning teams were announced at the ACM Multimedia Conference in Nice, France on October 24th. The first prize was awarded to the University of Science and Technology of China’ team.

The “AI Meets Beauty Challenge” is an annual competition inviting teams from around the world to propose solutions addressing beauty tech problems and to showcase how smart technologies can enhance the customers’ experience.

This year, the organizers provided a large-scale image dataset of over half million images of beauty and personal care products, named the Perfect-500K dataset. Participants were challenged to develop an AI algorithm that could correctly identify each product from the dataset.

A total of 55 qualified submissions from around the world were presented to the judges who selected four finalists whose academic papers were published at the ACM Multimedia Conference 2019. The first prize was awarded by the University of Science and Technology of China (USTC), showcasing advancement in image recognition techniques using Artificial Intelligence (AI) on a novel Generalized-attention Regional Maximal Activation of Convolutions (GRMAC) descriptor. This breakthrough offers a mechanism that reduces background noise and highlights the image, further enhancing the illustrated beauty product’s identification effectiveness. The teams from Guangdong University of Technology, and Guangzhou Shiyuan Electronic Technology Company were also awarded prizes.

“CyberLink has long been a pioneer in AI technology, and the company’s FaceMe® AI facial recognition engine has ranked among the world’s most precise solutions in the Face Recognition Vendor Test (FRVT) conducted by the U.S. National Institute of Standards and Technology (NIST),” said Dr. Jau Huang, CEO of CyberLink. “In addition to facial recognition, AI subject identification is an important technology for smart retail and a key focus for our company. This competition contributes to CyberLink’s search for global AI talent and partners to develop future smart retail solutions.”

“Congratulations to the winners for such a tremendous achievement. We want to thank all the participants who joined the challenge,” said the CEO and founder of Perfect Corp., Alice Chang. “We are excited to see so many talented AI researchers striving to achieve technology breakthrough. We believe research and advanced technology developments like those submitted in this contest will empower the beauty industry’s digital transformation and reshape the customer’s journey.”

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Next generation of VEGAS Movie Studio available – more intuitive, more powerful

VEGAS Creative Software adds innovative workflow features and a multitude of professional tools to their popular video editing software VEGAS Movie Studio. Creating impressive videos has never been easier.
VEGAS Creative Software announces the all-new VEGAS Movie Studio 16. Powerful new features allow beginners as well as advanced users to create stunning videos in an efficient, fun editing environment.
The Guided Video Creator leads users from the beginning to the end through four easy steps to a complete movie. Even without previous experience, everyone can achieve impressive results. Focused editing modes offer specialized user interfaces to import and arrange files, add graphics, apply effects and transitions, and finish the movie. The user can easily switch between modes or jump into Power User mode for fast, efficient video creation.
“The unique Guided Video Creator helps anyone edit a movie fast regardless of experience level. When you’re ready for more control, the streamlined mode-based workflow guides you through the process, and full-featured Power User mode gives you the ultimate creative control. VEGAS Movie Studio makes it possible for anyone to produce great videos no matter how much experience they have”, says Gary Rebholz, VEGAS Movie Studio Product Owner.
Robust enhancements to the Project Media window make it easy to scrub through thumbnails to find the best part of a clip and set in and out points to isolate just the section of the video needed. For more precision, thumbnails can be resized. With the powerful interactive storyboard, users can quickly assemble a rough cut while edits instantly and automatically appear on the timeline. With these and many other intelligent workflow enhancements, VEGAS Movie Studio once again sets new standards in intuitive video editing.
In addition to these features in the basic version, the Platinum and the Suite versions introduce an impressive array of powerful new features normally found in professional video editing software. Precise motion tracking allows for easily tracking an moving object, isolating it to apply FX and adding text to follow it. The new video stabilization engine in VEGAS Movie Studio 16 quickly stabilizes wobbly footage and creates smooth, professional videos in an instant. With the complete 360° editing workflow, dual-fisheye footage can now be stitched, processed and exported with ease.
VEGAS Movie Studio 16 Suite offers advanced users an exciting package from NewBlueFX, including Titler Pro Express, for professional, animated 3D titles; the powerful and intuitive Chroma Key Pro; Essentials 5 Volume 3, with a large collection of professional-level tools to perfect colors, sharpen details, and polish the finished project; and much more.
“Users make it clear that they need tools which help them have fun while being productive,” says Rebholz. “VEGAS Movie Studio 16 brings powerful tools like those the pros use to everyone, and makes creating videos easy even while offering the most sophisticated editing tools and features.”
New features at a glance:
Guided Video Creator: The uniquely clever Guided Video Creator leads through video creation from start to finish. Use it to arrange clips, add music and titles, and finish the movie all within a single window – always with the option to take full control in the timeline.
Mode-based workflows: Move between specialized interfaces for all kinds of editing tasks to ensure fast and efficient video creation. A Power User mode offers complete access to all of the advanced tools.
Interactive storyboard editing: Easily create a rough cut of the video. Make changes and edits in the storyboard and see them automatically updated on the main timeline.
Hover Scrub: Move the mouse across video thumbnails in the storyboard to scrub through the video down to exact frames and find the important parts before adding them to the project.
In/Out points: Set in and out points in video files before adding them to the timeline so that timeline clip events will be automatically trimmed to the selected points.
Resizable thumbnails: Resize video thumbnails in the storyboard to see more detail and hover scrub to exact frames more easily for setting in and out points precisely.
Preview multiple selected files: Preview multiple media clips in sequence with a single play. A fast way to make and preview a rough edit.
Render cancel confirmation: VEGAS Movie Studio 16 ensures maximum protection by requesting confirmation before cancelling a rendering process.
Delete track warning: The new safety feature sends a warning if the track to be deleted contains any media.
Exclusively in VEGAS Movie Studio Platinum and Suite:
Precise motion tracking: Isolate, follow, and apply FX to moving objects in any scene, and pin other objects to move along with them.
Video stabilization: Stabilize shaky footage and get smooth, professional video results with just a click.
Bézier Masking OFX: Isolate and add effects to objects easier than ever by quickly adding and customizing Bézier masks directly in the preview window.
360° editing workflow: Make immersive, interactive video environments quickly and efficiently. Easily stitch together dual-fisheye footage, preview videos in 360°, and export directly to YouTube or other 360° video services.
Auto save and backup: Automatically save after every edit, and set an interval for periodic automatic file back up to keep multiple project versions.
Add missing stream: Use a simple right-click to automatically add back audio or video of a clip to the timeline.
Display length on event: See the exact length of timeline clip events displayed right in the event header. Type an exact value accurate to the frame to change the length of any event directly.
Temporarily ignore event grouping: Temporarily ignore event grouping to move an event while it stays permanently grouped with other events.
Indicate effects: Use this feature to see which media has FX added, then access and edit the effects directly from the timeline.
NewBlue Transitions 5 Ultimate: This plug-in provides a huge array of great pro-level animated transitions to give all videos a personalized look.
Exclusively in VEGAS Movie Studio Suite:
NewBlueFX Packages: Titler Pro Express, Chroma Key Pro, Cartoonr Plus, Cinema Collection Template Pack, Fluid Template Pack, and Essentials 5 Volume 3 – all powerful tools to give all videos a polished, professional shine.
Learn more at  https://vegascreative.hk/product-category/moviestudio/